US8810657B1 - Video monitoring and alarm verification technology - Google Patents
Video monitoring and alarm verification technology Download PDFInfo
- Publication number
- US8810657B1 US8810657B1 US13/970,266 US201313970266A US8810657B1 US 8810657 B1 US8810657 B1 US 8810657B1 US 201313970266 A US201313970266 A US 201313970266A US 8810657 B1 US8810657 B1 US 8810657B1
- Authority
- US
- United States
- Prior art keywords
- mobile device
- monitored property
- live video
- user
- camera
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/04—Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
Definitions
- This disclosure relates to video monitoring and alarm verification technology.
- Alarm systems may include control panels that a person may use to control operation of the alarm system and sensors that monitor for security breaches.
- the alarm system may generate an audible alert and, if the alarm system is monitored by a monitoring service, the alarm system may send electronic data to the monitoring service to alert the monitoring service of the security breach.
- Implementations of the described techniques may include hardware, a method or process implemented at least partially in hardware, or a computer-readable storage medium encoded with executable instructions that, when executed by a processor, perform operations.
- FIG. 1 illustrates an example of sharing image data.
- FIG. 2 illustrates an example system
- FIGS. 3 , 5 , and 7 are flow charts illustrating example processes.
- FIG. 4 illustrates an example of sharing image data.
- FIGS. 6A-6C illustrate examples of sharing image data with users identified based on an attribute associated with the image data.
- FIGS. 8A-8C illustrate an example of automatically sharing image data.
- the techniques described throughout this disclosure allow the system owner to share video and other event data with third parties (e.g., pre-specified third parties) in the event of an emergency without granting access during non-emergencies, which may be defined by the system owner.
- third parties e.g., pre-specified third parties
- a user that has a system monitoring a property can subscribe to alerts (e.g., text alerts or other types of notifications) about alarms or other activity of interest when the user is away from the user's property.
- alerts e.g., text alerts or other types of notifications
- a mobile device e.g., a smart phone
- the user can use a mobile application on the mobile device to watch live video (or view recently captured still images) from a security camera included in the user's monitoring system.
- the user can determine whether an alarm event is actually occurring in the user's property by reviewing the live video (or images).
- the user can provide an input command (e.g., click a button from inside the mobile application) to alert an emergency contact list (including sending them a relevant video file or image file) and make a phone call to local police/emergency dispatch.
- an input command e.g., click a button from inside the mobile application
- the user can provide an input command (e.g., click a button from inside the mobile application) to control the monitoring system accordingly (e.g., deactivate an alarm being sounded by the monitoring system).
- the type of notification sent may be an electronic mail message or text message with a description of the event, a video/image attachment, and/or a link that the recipient can use to log into an event portal that provides access to sensor status, live video, and/or saved video files relevant to the event.
- the link also may open a portal that displays a shared image of the customer web/mobile portal screen, allowing the customer to control what data/video/image is shared with the recipient.
- the owner of the alarm system maintains control over the information from the monitoring system that is shared.
- FIG. 1 illustrates an example of sharing image data.
- a property 105 includes a camera 115 that captures images of the property 105 and a security system panel 120 of a security system that monitors the property 105 based on outputs of various sensors that sense physical events or conditions at the property 105 .
- the security system panel 120 detects opening of a door to the property 105 based on output from a door sensor and initiates an entry delay period in which the user 110 may enter a password at the security system panel 120 to disarm the security system.
- FIG. 1 illustrates an example of sharing image data.
- a property 105 includes a camera 115 that captures images of the property 105 and a security system panel 120 of a security system that monitors the property 105 based on outputs of various sensors that sense physical events or conditions at the property 105 .
- the user 110 does not enter a proper password at the security system panel 120 before expiration of the entry delay period and the security system panel 120 detects an alarm condition. Based on detection of the alarm condition, the security system panel 120 sends alarm data to a monitoring station device 160 of a monitoring station associated with security system of the property 105 (e.g., a central monitoring station that dispatches emergency services based on alarm events detected by security systems including the security system at the property 105 ).
- a monitoring station device 160 of a monitoring station associated with security system of the property 105 e.g., a central monitoring station that dispatches emergency services based on alarm events detected by security systems including the security system at the property 105 ).
- the camera 115 establishes a connection with a mobile phone 130 used by a mom user and transmits live video of the property 105 to the mobile phone 130 over the established connection.
- the mobile phone 130 used by the mom user is registered as the primary contact of the camera 115 (or the security system) and is, therefore, provided with the live video.
- Other devices or multiple devices may be registered as contacts and may receive live video directly from the camera 115 , as well.
- the camera 115 may begin capturing video and initiate establishment of the connection with the mobile phone 130 based on the security system panel 120 detecting the alarm condition. For instance, the security system panel 120 may send a signal to the camera 115 in response to detecting the alarm condition and the camera 115 may begin capturing video and initiate establishment of the connection with the mobile phone 130 in response to receiving the signal. In other examples, the camera 115 may begin capturing video and initiate establishment of the connection with the mobile phone 130 based on the security system panel 120 detecting the door opening event when the user 110 entered the property 105 .
- the camera 115 also may begin capturing video and initiate establishment of the connection with the mobile phone 130 based on the user 110 triggering a motion sensor (e.g., a Passive Infrared Motion detector) included in the camera 115 .
- the camera 115 further may begin capturing and locally storing video based on the security system panel 120 detecting the door opening event or trigger of its own internal motion sensor and then initiate establishment of the connection with the mobile phone 130 based on the security system panel 120 detecting the alarm condition.
- the mobile phone 130 includes a video display area 131 that displays the live video captured by the camera 115 on the mobile phone 130 .
- the mom user may use the mobile phone 130 to view live video of the property 105 and assess the alarm condition detected by the security system panel 120 .
- the mobile phone 130 also displays a list of virtual buttons 132 , 133 , and 134 that the mom user can activate to initiate sharing of the live video to one or more other devices.
- the mobile phone 130 further displays a start button 135 and a stop button 136 that the mom user can activate to control recording of the live video on electronic storage of the mobile phone 130 .
- the mobile phone 130 may store a buffer of a set amount (e.g., one minute) of the live video data at all times.
- the set amount of live video data stored in the buffer is added to the front of the recording so that the recording covers up to the set amount (e.g., one minute) of live video data displayed prior to activation of the start button 135 .
- the list of virtual buttons 132 , 133 , and 134 includes a first button 132 that initiates sharing of the live video received from the camera 115 with a mobile phone 140 of a friend user, a second button 133 that initiates sharing of the live video received from the camera 115 with a first responder device 150 used by emergency services personnel that respond to alarm conditions, and a third button 134 that initiates sharing of the live video received from the camera 115 with the monitoring station device 160 .
- the mom user may use the virtual buttons 132 , 133 , and 134 to establish a connection and share the live video with any one or more of the mobile phone 140 of the friend user, the first responder device 150 , and the monitoring station device 160 .
- the mom user may activate the first button 132 .
- the mobile phone 130 identifies contact information for the mobile phone 140 of the friend user (e.g., accesses contact information from an address book stored at the mobile phone 130 ) and establishes a connection with the mobile phone 140 of the friend user using the contact information.
- the mobile phone 130 then shares the live video received from the camera 115 with the mobile phone 140 of the friend user over the established connection.
- the mobile phone 140 of the friend user displays the live video concurrently with the mobile phone 130 of the mom user, so that the friend user can assist the mom user in assessing the live video and determining whether an actual alarm exists.
- the established connection between the mobile phone 130 and the mobile phone 140 may be a direct connection between the mobile phone 130 and the mobile phone 140 that allows the mobile phone 140 to receive shared video data from the mobile phone 130 , but restricts the mobile phone 140 from accessing other data of the mobile phone 130 or learning of identification information for the camera 115 .
- the established connection between the mobile phone 130 and the mobile phone 140 allows the mom user to safely share the live video of the potential alarm condition with the friend user while preventing the friend user from accessing video captured by the camera 115 at other times.
- the mom user may activate the second button 133 .
- the mobile phone 130 identifies contact information for the first responder device 150 and establishes a connection with the first responder device 150 using the contact information.
- the mobile phone 130 then shares the live video received from the camera 115 with the first responder device 150 over the established connection. Accordingly, the first responder device 150 displays the live video displayed by the mobile phone 130 of the mom user.
- the established connection between the mobile phone 130 and the first responder device 150 may be a direct connection between the mobile phone 130 and the first responder device 150 that allows the first responder device 150 to receive shared video data from the mobile phone 130 , but restricts the first responder device 150 from accessing other data of the mobile phone 130 or learning of identification information for the camera 115 .
- the established connection between the mobile phone 130 and the first responder device 150 allows the mom user to safely share the live video of the alarm condition with a first responder while preventing the first responder from accessing video captured by the camera 115 at other times.
- the mobile phone 130 may store contact information for the first responder device 150 based on the address of the property 105 and the type of alarm condition.
- the first responder device 150 may be a central computer of an emergency services agency that is able to relay video to mobile devices used by first responders handling the alarm condition. For instance, when the alarm condition is an expected break in at the property 105 , the mobile phone 130 may access contact information for a central computer at a police station that services the property 105 and share the video with the central computer at the police station with data indicating the address of the property 105 .
- the central computer at the police station may identify police officers responding to the alarm condition based on the address of the property 105 , access contact information for mobile devices used by the identified police officers, and relay the shared video to the mobile devices used by the identified police officers.
- the mobile phone 130 may access contact information for a central computer at a fire station that services the property 105 and share the video with the central computer at the fire station with data indicating the address of the property 105 .
- the central computer at the fire station may identify firemen responding to the alarm condition based on the address of the property 105 , access contact information for mobile devices used by the identified firemen, and relay the shared video to the mobile devices used by the identified firemen.
- the mobile phone 130 receives contact information for the first responder device 150 from the monitoring station device 160 .
- the first responder device 150 may be a mobile device used by a first responder assigned to handle the alarm condition at the property 105 and the monitoring station device 160 may receive contact information of the mobile device used by the first responder when dispatching emergency services. Accordingly, after receiving the contact information for the first responder device 150 from the monitoring station device 160 , the mobile phone 130 is able to directly share the video of the property 105 with the mobile device used by the first responder.
- the mom user may activate the third button 134 .
- the mobile phone 130 identifies contact information for the monitoring station device 160 (e.g., stored contact information for the monitoring station device 160 used by the monitoring station that services the property 105 ) and establishes a connection with the monitoring station device 160 using the contact information.
- the mobile phone 130 then shares the live video received from the camera 115 with the monitoring station device 160 over the established connection.
- the monitoring station device 160 displays the live video displayed by the mobile phone 130 of the mom user and, therefore, may be able to more quickly determine whether the alarm data signifies an actual alarm condition or a false alarm.
- the established connection between the mobile phone 130 and the monitoring station device 160 may be a direct connection between the mobile phone 130 and the monitoring station device 160 that allows the monitoring station device 160 to receive shared video data from the mobile phone 130 , but restricts the monitoring station device 160 from accessing other data of the mobile phone 130 or learning of identification information for the camera 115 .
- the established connection between the mobile phone 130 and the monitoring station device 160 allows the mom user to safely share the live video of the alarm condition with a monitoring station operator while preventing the monitoring station operator from accessing video captured by the camera 115 at other times.
- the monitoring station device 160 may be a central computer of a monitoring station that is able to relay video to devices used by operators employed by the monitoring station.
- the mobile phone 130 may store contact information for the central computer of the monitoring station and establish a connection with the central computer of the monitoring station. After establishing the connection, the mobile phone 130 shares the video over the established connection and also sends linking data to the central computer of the monitoring station that enables the central computer of the monitoring station to link the video with the alarm data received from the security system panel 120 .
- the linking data may be any data that enables the central computer of the monitoring station to link the video with the alarm data. For instance, the linking data may be an address of the property 105 , an account number for the security system at the property 105 , etc.
- the central computer of the monitoring station When the central computer of the monitoring station receives the linking data, the central computer of the monitoring station identifies which operator is handling the alarm data and routes the shared video to a device used by the identified operator so that the appropriate operator receives the video data.
- the operator processing the alarm data may be able to more quickly determine whether the alarm condition is an actual alarm or a false alarm.
- FIG. 2 illustrates an example of an electronic system 200 configured to provide video monitoring and alarm verification.
- the electronic system 200 includes a network 205 , a monitoring system control unit 210 , one or more user devices 240 , 250 , a monitoring application server 260 , and one or more third party devices 270 , 280 .
- the network 205 facilitates communications between the monitoring system control unit 210 , the one or more user devices 240 , 250 , and the monitoring application server 260 .
- the one or more third party devices 270 , 280 also may be connected to the network 205 and exchange communications with other devices connected to the network 205 .
- the network 205 is configured to enable exchange of electronic communications between devices connected to the network 205 .
- the network 205 may be configured to enable exchange of electronic communications between the monitoring system control unit 210 , the one or more user devices 240 , 250 , and the monitoring application server 260 .
- the network 205 may include, for example, one or more of the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), analog or digital wired and wireless telephone networks (e.g., a public switched telephone network (PSTN), Integrated Services Digital Network (ISDN), a cellular network, and Digital Subscriber Line (DSL)), radio, television, cable, satellite, or any other delivery or tunneling mechanism for carrying data.
- PSTN public switched telephone network
- ISDN Integrated Services Digital Network
- DSL Digital Subscriber Line
- Network 205 may include multiple networks or subnetworks, each of which may include, for example, a wired or wireless data pathway.
- the network 205 may include a circuit-switched network, a packet-switched data network, or any other network able to carry electronic communications (e.g., data or voice communications).
- the network 205 may include networks based on the Internet protocol (IP), asynchronous transfer mode (ATM), the PSTN, packet-switched networks based on IP, X.25, or Frame Relay, or other comparable technologies and may support voice using, for example, VoIP, or other comparable protocols used for voice communications.
- IP Internet protocol
- ATM asynchronous transfer mode
- the network 205 may include one or more networks that include wireless data channels and wireless voice channels.
- the network 205 may be a wireless network, a broadband network, or a combination of networks including a wireless network and a broadband network.
- the monitoring system control unit 210 includes a controller 212 and a network module 214 .
- the controller 212 is configured to control a monitoring system (e.g., a home alarm or security system) that includes the monitoring system control unit 210 .
- the controller 212 may include a processor or other control circuitry configured to execute instructions of a program that controls operation of an alarm system.
- the controller 212 may be configured to receive input from sensors, detectors, or other devices included in the alarm system and control operations of devices included in the alarm system or other household devices (e.g., a thermostat, an appliance, lights, etc.).
- the controller 212 may be configured to control operation of the network module 214 included in the monitoring system control unit 210 .
- the network module 214 is a communication device configured to exchange communications over the network 205 .
- the network module 214 may be a wireless communication module configured to exchange wireless communications over the network 205 .
- the network module 214 may be a wireless communication device configured to exchange communications over a wireless data channel and a wireless voice channel.
- the network module 214 may transmit alarm data over a wireless data channel and establish a two-way voice communication session over a wireless voice channel.
- the wireless communication device may include one or more of a GSM module, a radio modem, cellular transmission module, or any type of module configured to exchange communications in one of the following formats: GSM or GPRS, CDMA, EDGE or EGPRS, EV-DO or EVDO, UMTS, LTE, or IP.
- the network module 214 also may be a wired communication module configured to exchange communications over the network 205 using a wired connection.
- the network module 214 may be a modem, a network interface card, or another type of network interface device.
- the network module 214 may be an Ethernet network card configured to enable the monitoring system control unit 210 to communicate over a local area network and/or the Internet.
- the network module 214 also may be a voiceband modem configured to enable the alarm panel to communicate over the telephone lines of Plain Old Telephone Systems (POTS).
- POTS Plain Old Telephone Systems
- the monitoring system that includes the monitoring system control unit 210 includes one or more sensors or detectors.
- the monitoring system may include multiple sensors 220 .
- the sensors 220 may include a contact sensor, a motion sensor, a glass break sensor, or any other type of sensor included in an alarm system or security system.
- the sensors 220 also may include an environmental sensor, such as a temperature sensor, a water sensor, a rain sensor, a wind sensor, a light sensor, a smoke detector, a carbon monoxide detector, an air quality sensor, etc.
- the sensors 220 further may include a health monitoring sensor, such as a prescription bottle sensor that monitors taking of prescriptions, a blood pressure sensor, a blood sugar sensor, a bed mat configured to sense presence of liquid (e.g., bodily fluids) on the bed mat, etc.
- a health monitoring sensor such as a prescription bottle sensor that monitors taking of prescriptions, a blood pressure sensor, a blood sugar sensor, a bed mat configured to sense presence of liquid (e.g., bodily fluids) on the bed mat, etc.
- the sensors 220 may include a radio-frequency identification (RFID) sensor that identifies a particular article that includes a pre-assigned RFID tag.
- RFID radio-frequency identification
- the monitoring system control unit 210 communicates with the module 222 and the camera 230 to perform visual surveillance or monitoring.
- the module 222 is connected to one or more lighting systems and is configured to control operation of the one or more lighting systems.
- the module 222 may control the one or more lighting systems based on commands received from the monitoring system control unit 210 . For instance, the module 222 may cause a lighting system to illuminate an area to provide a better image of the area when captured by a camera 230 .
- the camera 230 may be a video/photographic camera or other type of optical sensing device configured to capture images.
- the camera 230 may be configured to capture images of an area within a building monitoring by the monitoring system control unit 210 .
- the camera 230 may be configured to capture single, static images of the area and also video images of the area in which multiple images of the area are captured at a relatively high frequency (e.g., thirty images per second).
- the camera 230 may be controlled based on commands received from the monitoring system control unit 210 .
- the camera 230 may be triggered by several different types of techniques. For instance, a Passive Infra Red (PIR) motion sensor may be built into the camera 230 and used to trigger the camera 230 to capture one or more images when motion is detected.
- the camera 230 also may include a microwave motion sensor built into the camera and used to trigger the camera 230 to capture one or more images when motion is detected.
- the camera 230 may have a “normally open” or “normally closed” digital input that can trigger capture of one or more images when external sensors (e.g., the sensors 220 , PIR, door/window, etc.) detect motion or other events.
- the camera 230 receives a software command to capture an image when external devices detect motion.
- the camera 230 may receive the software command from the controller 212 or directly from one of the sensors 220 .
- the camera 230 triggers integrated or external illuminators (e.g., Infra Red, Z-wave controlled “white” lights, lights controlled by the module 222 , etc.) to improve image quality when the scene is dark.
- integrated or external illuminators e.g., Infra Red, Z-wave controlled “white” lights, lights controlled by the module 222 , etc.
- An integrated or separate light sensor may be used to determine if illumination is desired and may result in increased image quality.
- the sensors 220 , the module 222 , and the camera 230 communicate with the controller 212 over communication links 224 , 226 , and 228 .
- the communication links 224 , 226 , and 228 may be a wired or wireless data pathway configured to transmit signals from the sensors 220 , the module 222 , and the camera 230 to the controller 212 .
- the sensors 220 , the module 222 , and the camera 230 may continuously transmit sensed values to the controller 212 , periodically transmit sensed values to the controller 212 , or transmit sensed values to the controller 212 in response to a change in a sensed value.
- the communication link 228 over which the camera 230 and the controller 212 communicate may include a local network.
- the camera 230 and the controller 212 may exchange images and commands over the local network.
- the local network may include 802.11 “WiFi” wireless Ethernet (e.g., using low-power WiFi chipsets), Z-Wave, Zigbee, Bluetooth, “Homeplug” or other “Powerline” networks that operate over AC wiring, and a Category 5 (CAT5) or Category 6 (CAT6) wired Ethernet network.
- the monitoring application server 260 is an electronic device configured to provide monitoring services by exchanging electronic communications with the monitoring system control unit 210 and the one or more user devices 240 , 250 over the network 205 .
- the monitoring application server 260 may be configured to monitor events generated by the monitoring system control unit 210 .
- the monitoring application server 260 may exchange electronic communications with the network module 214 included in the monitoring system control unit 210 to receive information regarding alarm events detected by the monitoring system control unit 210 .
- the monitoring application server 260 also may receive information regarding events from the one or more user devices 240 , 250 .
- the monitoring application server 260 may store sensor and image/video data received from the monitoring system and perform analysis of sensor and image/video data received from the monitoring system. Based on the analysis, the monitoring application server 260 may communicate with and control aspects of the monitoring system control unit 210 or the one or more user devices 240 , 250 . The monitoring application server 260 also may make images/video captured by the camera 230 available to the one or more user devices 240 , 250 over the network 205 (e.g., through a web portal). In this regard, the one or more user devices 240 , 250 may display images/video captured by the camera 230 from a remote location. This enables a user to perceive images/video of the user's property from a remote location and verify whether or not an alarm event is occurring at the user's property.
- the one or more user devices 240 , 250 are devices that host and display user interfaces.
- the user device 240 is a mobile device that hosts one or more native applications (e.g., the native surveillance application 242 ).
- the user device 240 may be a cellular phone or a non-cellular locally networked device with a display.
- the user device 240 may include a cell phone, a smart phone, a tablet PC, a personal digital assistant (“PDA”), or any other portable device configured to communicate over a network and display information.
- PDA personal digital assistant
- implementations may also include Blackberry-type devices (e.g., as provided by Research in Motion), electronic organizers, iPhone-type devices (e.g., as provided by Apple), iPod devices (e.g., as provided by Apple) or other portable music players, other communication devices, and handheld or portable electronic devices for gaming, communications, and/or data organization.
- the user device 240 may perform functions unrelated to the monitoring system, such as placing personal telephone calls, playing music, playing video, displaying pictures, browsing the Internet, maintaining an electronic calendar, etc.
- the user device 240 includes a native surveillance application 242 .
- the native surveillance application 242 refers to a software/firmware program running on the corresponding mobile device that enables the user interface and features described throughout.
- the user device 240 may load or install the native surveillance application 242 based on data received over a network or data received from local media.
- the native surveillance application 242 runs on mobile devices platforms, such as iPhone, iPod touch, Blackberry, Google Android, Windows Mobile, etc.
- the native surveillance application 242 enables the user device 240 to receive and process image, video, and/or sensor data from the monitoring system.
- the user device 250 may be a general-purpose computer (e.g., a desktop personal computer, a workstation, or a laptop computer) that is configured to communicate with the monitoring application server 260 and/or the monitoring system control unit 210 over the network 205 .
- the user device 250 may be configured to display a surveillance monitoring user interface 252 that is generated by the user device 250 or generated by the monitoring application server 260 .
- the user device 250 may be configured to display a user interface (e.g., a web page) provided by the monitoring application server 260 that enables a user to perceive images/video captured by the camera 230 and/or reports related to the monitoring system.
- FIG. 2 illustrates two user devices for brevity, actual implementations may include more (and, perhaps, many more) or fewer user devices.
- the one or more user devices 240 , 250 communicate with and receive monitoring system data from the monitoring system control unit 210 using the communication link 238 .
- the one or more user devices 240 , 250 may communicate with the monitoring system control unit 210 using various local wireless protocols such as wifi, Bluetooth, zwave, zigbee, HomePlug (ethernet over powerline), or wired protocols such as Ethernet and USB, to connect the one or more user devices 240 , 250 to local security and automation equipment.
- the one or more user devices 240 , 250 may connect locally to the monitoring system and its sensors and other devices. The local connection may improve the speed of status and control communications because communicating through the network 205 with a remote server (e.g., the monitoring application server 260 ) may be significantly slower.
- a remote server e.g., the monitoring application server 260
- the one or more user devices 240 , 250 are shown as communicating with the monitoring system control unit 210 , the one or more user devices 240 , 250 may communicate directly with the sensors and other devices controlled by the monitoring system control unit 210 . In some implementations, the one or more user devices 240 , 250 replace the monitoring system control unit 210 and perform the functions of the monitoring system control unit 210 for local monitoring and long range/offsite communication.
- the one or more user devices 240 , 250 receive monitoring system data captured by the monitoring system control unit 210 through the network 205 .
- the one or more user devices 240 , 250 may receive the data from the monitoring system control unit 210 through the network 205 or the monitoring application server 260 may relay data received from the monitoring system control unit 210 to the one or more user devices 240 , 250 through the network 205 .
- the monitoring application server 260 may facilitate communication between the one or more user devices 240 , 250 and the monitoring system.
- the one or more user devices 240 , 250 may be configured to switch whether the one or more user devices 240 , 250 communicate with the monitoring system control unit 210 directly (e.g., through link 238 ) or through the monitoring application server 260 (e.g., through network 205 ) based on a location of the one or more user devices 240 , 250 . For instance, when the one or more user devices 240 , 250 are located close to the monitoring system control unit 210 and in range to communicate directly with the monitoring system control unit 210 , the one or more user devices 240 , 250 use direct communication. When the one or more user devices 240 , 250 are located far from the monitoring system control unit 210 and not in range to communicate directly with the monitoring system control unit 210 , the one or more user devices 240 , 250 use communication through the monitoring application server 260 .
- the one or more user devices 240 , 250 are shown as being connected to the network 205 , in some implementations, the one or more user devices 240 , 250 are not connected to the network 205 . In these implementations, the one or more user devices 240 , 250 communicate directly with one or more of the monitoring system components and no network (e.g., Internet) connection or reliance on remote servers is needed.
- no network e.g., Internet
- the one or more user devices 240 , 250 are used in conjunction with only local sensors and/or local devices in a house.
- the system 200 only includes the one or more user devices 240 , 250 and the sensors 220 , the module 222 , and the camera 230 .
- the one or more user devices 240 , 250 receive data directly from the sensors 220 , the module 222 , and the camera 230 and sends data directly to the sensors 220 , the module 222 , and the camera 230 .
- the one or more user devices 240 , 250 provide the appropriate interfaces/processing to provide visual surveillance and reporting.
- system 200 further includes network 205 and the sensors 220 , the module 222 , and the camera 230 are configured to communicate sensor and image/video data to the one or more user devices 240 , 250 over network 205 (e.g., the Internet, cellular network, etc.).
- network 205 e.g., the Internet, cellular network, etc.
- the sensors 220 , the module 222 , and the camera 230 are intelligent enough to change the communication pathway from a direct local pathway when the one or more user devices 240 , 250 are in close physical proximity to the sensors 220 , the module 222 , and the camera 230 to a pathway over network 205 when the one or more user devices 240 , 250 are farther from the sensors 220 , the module 222 , and the camera 230 .
- the system leverages GPS information from the one or more user devices 240 , 250 to determine whether the one or more user devices 240 , 250 are close enough to the sensors 220 , the module 222 , and the camera 230 to use the direct local pathway or whether the one or more user devices 240 , 250 are far enough from the sensors 220 , the module 222 , and the camera 230 that the pathway over network 205 is required.
- the system leverages status communications (e.g., pinging) between the one or more user devices 240 , 250 and the sensors 220 , the module 222 , and the camera 230 to determine whether communication using the direct local pathway is possible.
- the one or more user devices 240 , 250 communicate with the sensors 220 , the module 222 , and the camera 230 using the direct local pathway. If communication using the direct local pathway is not possible, the one or more user devices 240 , 250 communicate with the sensors 220 , the module 222 , and the camera 230 using the pathway over network 205 .
- the one or more third party devices 270 , 280 are devices that may establish connections with the one or more user devices 240 , 250 and display user interfaces based on data (e.g., video or image data) received from the one or more user devices 240 , 250 .
- the one or more third party devices 270 , 280 may include a mobile device that hosts one or more native applications.
- the one or more third party devices 270 , 280 may include a cellular phone or a non-cellular locally networked device with a display.
- the one or more third party devices 270 , 280 may include a mobile phone, a smart phone, a tablet PC, a personal digital assistant (“PDA”), or any other portable device configured to communicate over a network and display information.
- PDA personal digital assistant
- implementations may also include Blackberry-type devices (e.g., as provided by Research in Motion), electronic organizers, iPhone-type devices (e.g., as provided by Apple), iPod devices (e.g., as provided by Apple) or other portable music players, other communication devices, and handheld or portable electronic devices for gaming, communications, and/or data organization.
- the one or more third party devices 270 , 280 may perform functions unrelated to the monitoring system, such as placing personal telephone calls, playing music, playing video, displaying pictures, browsing the Internet, maintaining an electronic calendar, etc.
- the one or more third party devices 270 , 280 also may include a general-purpose computer (e.g., a desktop personal computer, a workstation, or a laptop computer) that is configured to communicate with the one or more user devices 240 , 250 (e.g., over the network 205 ).
- the one or more third party devices 270 , 280 may be configured to display a surveillance monitoring user interface 272 , 282 that is generated by the one or more third party devices 270 , 280 , the one or more user devices 240 , 250 , or the monitoring application server 260 .
- the one or more third party devices 270 , 280 may be configured to display a user interface that enables a user to perceive images/video captured by the camera 230 and/or reports related to the monitoring system.
- the one or more third party devices 270 , 280 may receive the data included in the user interface from the one or more user devices 240 , 250 .
- FIG. 2 illustrates two third party devices for brevity, actual implementations may include more (and, perhaps, many more) or fewer third devices.
- the one or more third party devices 270 , 280 may be operated by a third party individual (such as a friend or relative) or a third party company (e.g., an alarm verification device of a central alarm monitoring station that dispatches emergency services based on alarm events detected by the monitoring system).
- the one or more third party devices 270 , 280 establish a sharing connection with the one or more user devices 240 , 250 to receive video, image, and/or other sensor data from the one or more user devices 240 , 250 .
- the sharing connection may be established over the network 205 or may be direct between the one or more user devices 240 , 250 and the one or more third party devices 270 , 280 .
- the sharing connection enables the one or more user devices 240 , 250 to control the data that the one or more third party devices 270 , 280 receive.
- the one or more third party devices 270 , 280 only receive data provided by the one or more user devices 240 , 250 and do not have direct access to the monitoring system or the camera 230 .
- the one or more third party devices 270 , 280 may provide commands to control aspects of the monitoring system or the camera 230 . Because the commands are received at the one or more user devices 240 , 250 , the one or more user devices 240 , 250 control whether or not the commands are allowed and sent to the monitoring system.
- the one or more user devices 240 , 250 control what data the one or more third party devices 270 , 280 receive and what actions the one or more third party devices 270 , 280 can take with respect to the monitoring system. This may allow users to retain privacy in the monitoring system and be more likely to share limited access to the monitoring system information to enable alarm verification, which may be desired by central alarm monitoring stations that dispatch emergency services based on alarm events detected by the monitoring system.
- the one or more user devices 240 , 250 initiate the sharing connection based on a user input command entered by a user after reviewing video or image data from the camera 230 .
- the one or more user devices 240 , 250 may provide the one or more third party devices 270 , 280 with information needed to establish the sharing connection in response to the user input command.
- the information may include a link that opens a portal that displays a shared image of a portal screen (e.g., a customer web/mobile portal screen) that allows the user operating the user device to control what data/video/image is shared with the recipient operating the third party device.
- the information also may include credentials, such as a password, a machine token, etc. that the third party device can use to be authenticated to the user device.
- the credentials may be temporary or one-time access credentials to prevent the third party device from using the credentials to gain access to the monitoring system at a later date.
- the one or more user devices 240 , 250 may provide the one or more third party devices 270 , 280 with permission or credentials to access the monitoring system directly or the monitoring application server 260 for a limited time.
- the user device may provide the third party device with a link that the third party device can use to log into an event portal on the monitoring application server 260 that provides access to sensor status, live video, and saved clips relevant to the event.
- the material included in the event portal may be controlled by the user (e.g., using the user device) and access may be granted for a limited period of time.
- FIGS. 3 , 5 , and 7 illustrate example processes.
- the operations of the example processes are described generally as being performed by the system 200 .
- the operations of the example processes may be performed by one of the components of the system 200 (e.g., one of the one or more user devices 240 , 250 ) or may be performed by any combination of the components of the system 200 .
- operations of the example processes may be performed by one or more processors included in one or more electronic devices.
- FIG. 3 illustrates an example process 300 for sharing image data.
- the system 200 establishes a first connection between a first device and a camera located in a monitored property associated with a user of the first device ( 310 ).
- the system 200 establishes a direct connection between the first device and the camera located in the monitored property associated with the user of the first device.
- the direct connection may be a connection where no intermediary device is present between the first device and the camera or may be a connection where only devices that simply route electronic communications between the first device and the camera are situated between the first device and the camera.
- the system 200 establishes an indirect connection between the first device and the camera located in the monitored property associated with the user of the first device.
- the direct connection may be a connection where an intermediary device is present between the first device and the camera and coordinates communication between the first device and the camera.
- a security system panel or a monitoring server may be situated between the first device and the camera and may coordinate communications between the first device and the camera.
- the system 200 receives image data over the first connection ( 320 ).
- the first device receives image data over the first connection established between the first device and the camera.
- the image data may be a single still image captured by a camera or may be video captured by the camera.
- the camera may send live video of the monitored property associated with the user of the first device over the established connection and the first device may receive live video sent over the established connection.
- the system 200 determines to establish a second connection with a second device that enables sharing of the received image data with the second device ( 330 ). For instance, the system 200 may receive user input indicating a desire of the user of the first device to share the received image data with the second device and determine to establish the second connection with the second device based on the received user input indicating the desire of the user of the first device to share the received image data with the second device.
- the user input may be selection of a share command button displayed by the first device in a list of possible sharing recipients.
- the system 200 may automatically, without user input, determine to share the received image data with the second device and determine to establish the second connection with the second device based on automatically, without user input, determining to share the received image data with the second device.
- the system 200 may analyze the circumstances involved in the receipt of image data with respect to a set of rules and determine whether the received image data should be automatically shared based on the analysis.
- the rules may indicate that the received image data should be automatically shared with all users associated with the monitored property when the security system has detected an alarm at the monitored property or may indicate that the received image data should be automatically shared with a second user associated with the monitored property when the security system has detected an event associated with a room used by the second user.
- the system 200 may determine to establish a second connection with a monitoring station device that is located at a monitoring station that monitors security system data from a security system located at the monitored property associated with the user of the first device.
- the system 200 establishes the second connection between the first device and the monitoring station device, shares, by the first device over the second connection, the received image data with the monitoring station device, and provides, by the first device over the second connection, identification information that enables the monitoring station device to link the shared image data with security system data received from the security system located at the monitored property over a communication pathway that is different than the first connection and the second connection.
- the security system may send alarm data over a cellular communication pathway to the monitoring station and the first device may establish a connection with the monitoring station over an IP-based network.
- the first device shares the video from the camera with the monitoring station over the IP-based network and also provides an account number of the user to the monitoring station.
- the monitoring station matches the account number of the user with the alarm data received over the cellular communication pathway and links the received video with the received alarm data, which may assist an operator with assessing the alarm data without allowing the operator to view video of the property at other times.
- the system 200 establishes the second connection between the first device and the second device ( 340 ). For instance, the system 200 establishes a direct or an indirect connection between the first device and the second device.
- the system 200 shares the received image data with the second device over the second connection ( 350 ).
- the first device sends still images or video to the second device over the second connection.
- still images or video of the monitored property may be displayed on the second device concurrently with display of the still images or video of the monitored property on the first device.
- the system 200 restricts an ability of the second device to directly access image data captured by the camera located in the monitored property ( 360 ). For example, by only sharing the image data from the first device to the second device, the system 200 prevents the second device from establishing a connection with the camera located in the monitored property. Specifically, the second device is only aware of the first device and the image data received from the first device and the second connection is established in a manner that prevents the second device from perceiving and accessing the first connection with the camera. In addition, the second connection is established in a manner that prevents the second device from perceiving identification information for the camera that the second device could use to attempt to access the camera.
- the camera may be configured to only initiate connections with other outside devices.
- the second device cannot directly connect to the camera because the camera refuses any connection requests made by the second device.
- passwords, machine tokens, or other authentication information may be needed to establish a connection with the camera. Because the second device does not have proper authentication information and cannot learn proper authentication information through the second connection with the first device, the second device is restricted from accessing the camera. By restricting the second device from accessing the camera, the system 200 may maintain privacy of a user of the monitored property while allowing the user to select certain times and certain people with which to temporary share video of the monitored property.
- FIG. 4 illustrates an example of sharing image data.
- a property 405 includes a camera 415 that captures images of the property 405 .
- the camera 415 establishes a direct connection with a mobile phone 420 of a mom user associated with the property 405 .
- the mom user views video captured by the camera 415 on the mobile phone 420 and determines to share video received over the direct connection with the camera 415 with a mobile phone 430 of a dad user and a mobile phone 440 of a neighbor user.
- the mobile phone 420 of the mom user shares video data captured by the camera 415 with the mobile phone 430 of the dad user and the mobile phone 440 of the neighbor user.
- the dad user and the neighbor user can view the same video being perceived by the mom user on their respective mobile phones without being able to directly access the camera 415 .
- the mom user is able to maintain privacy in video of the property 405 , but also share video of the property 405 when the mom user wishes to have assistance in assessing a potential alarm event at the property 405 .
- the mobile phone 420 of the mom user when the mobile phone 420 of the mom user establishes connections with the mobile phone 430 of the dad user and the mobile phone 440 of the neighbor user to share the video received from the camera 415 , the mobile phone 420 of the mom user also automatically, without additional user input, establishes a multi-user chat session between the mobile phone 420 of the mom user, the mobile phone 430 of the dad user, and the mobile phone 440 of the neighbor user.
- the multi-user chat session enables the mom user, the dad user, and the neighbor user to exchange text messages with one another that are seen by all users sharing the live video.
- the multi-user chat session may allow the mom user, the dad user, and the neighbor user to discuss the video that they are all simultaneously perceiving and come to a decision on how to handle the potential alarm situation.
- the multi-user chat session may exchange text-based messages using any appropriate protocol, such as an instant messaging protocol or a short message service (SMS) protocol.
- SMS short message service
- FIG. 5 illustrates an example process 500 for sharing image data with users identified based on an attribute associated with the image data.
- the system 200 receives image data from a camera located in a monitored property ( 510 ).
- the system 200 receives image data over a connection established between a device and the camera.
- the image data may be a single still image captured by the camera or may be video captured by the camera.
- the camera may send live video of a monitored property.
- the system 200 detects an attribute associated with the received image data ( 520 ). For instance, the system 200 may detect one or more attributes of the camera that captured the image data, one or more attributes associated with the circumstances in which the camera began capturing and sending image data, and/or one or more attributes of the image data itself. The system 200 may detect any combination of one or more attributes associated with the received image data.
- the system 200 may determine camera identification data for the camera at the monitored property that captured the received image data. For instance, the system 200 may detect an identifier of the camera from which the image data is being received.
- the system 200 may detect sensor data, sensed by a security system at the monitored property, that triggered the camera at the monitored property to capture the received image data.
- the system 200 may detect a motion sensor event, a door sensor event, and/or a window sensor event that was detected by the security system and triggered the camera to capture images.
- the attribute may indicate which sensor detected the event and provide information of detected activity at the monitored property occurring while the camera is capturing the received image data.
- the system 200 may use facial recognition processes to identify and recognize people included in the captured image data. For instance, the system 200 may detect whether any people are present in the image data and, if a person is included in the image data, detect an identity of the person if possible.
- the system 200 identifies one or more users with which to consider sharing the image data based on the detected attribute ( 530 ). For instance, the system 200 may, based on the detected attribute, determine a subset of multiple users that are potential candidates for sharing the image data and that are likely to be interested in the image data. The system 200 may analyze any combination of one or more attributes associated with the received image data in determining the subset of multiple users.
- the system 200 may identify one or more users based on the one or more attributes of the camera that captured the image data. For instance, the system 200 may identify one or more users based on camera identification data for the camera at the monitored property that captured the received image data. In this instance, the system 200 may determine an area of the monitored property associated with the identified camera and identify one or more users associated with the area.
- the system 200 may identify one or more users based on the one or more attributes associated with the circumstances in which the camera began capturing and sending image data. For example, the system 200 may identify one or more users based on the sensor data that triggered the camera at the monitored property to capture the received image data. In this example, the system 200 may determine an area of the monitored property where activity has been detected and identify one or more users associated with the area.
- the system 200 may identify one or more users based on the one or more attributes of the image data itself. For instance, the system 200 may identify at least one different user when a person is detected within the image data as compared to when a person is not detected within the image data. In addition, when the system 200 detects an identity of a person, the system 200 may use the detected identity to select a user that would be interested in seeing image data including the person. When the system 200 detects an unidentified person, the system 200 may identify a monitoring station operator or a first responder as a user with which to share the image data.
- the system 200 may access data defining a network of multiple users that are connected to the user of the first device and select, from the network of multiple users that are connected to the user of the first device, a subset of users based on the detected attribute.
- the network of multiple users may be all of the users that live at the monitored property.
- the network of multiple users also may be members of a social network of the user of the first device or other users registered as potential candidates for sharing image data by the user of the first device.
- the system 200 performs an operation directed to sharing the received image data with the identified one or more users ( 540 ). For example, the system 200 may display, in a list, identification data for each of the identified one or more users to enable the user of the first device to select one or more users to share the received image data. In this example, the system 200 enables the user of the first device to quickly initiate sharing of the image data with a relatively small subset of users by presenting controls that enable the user to share the image data with any combination of the identified one or more users.
- the system 200 automatically, without user input, shares the received image data with each of the identified one or more users. In these implementations, instead of waiting for the user of the first device to confirm that the image data should be shared, the system 200 automatically shares the image data such that the identified one or more users receive the image data as quickly as possible.
- FIGS. 6A-6C illustrate examples of sharing image data with users identified based on an attribute associated with the image data.
- a property 605 includes a first camera 610 located in a daughter's room, a second camera 620 located in a son's room, and a third camera 630 located in a dad's study.
- an event in the property 605 causes the first camera 610 to establish a connection with a mobile phone 640 of a mom user and begin sending video of the daughter's room to the mobile phone 640 of the mom user.
- the mobile phone 640 of the mom user includes a video display area 641 that displays the live video captured by the first camera 610 on the mobile phone 640 .
- the mobile phone 640 also displays a list of virtual buttons 642 and 643 that the mom user can activate to initiate sharing of the live video to one or more other devices.
- the mobile phone 640 further displays a start button 645 and a stop button 646 that the mom user can activate to control recording of the live video on electronic storage of the mobile phone 640 .
- the mobile phone 640 dynamically selects the list of virtual buttons 642 and 643 based on an attribute associated with the video.
- the attribute associated with the video may be identification information for the first camera 610 from which the video is being received.
- the mobile phone 640 may interpret the identification information for the first camera 610 and determine that the video is from the daughter's room based on a stored mapping of camera identification information to information describing camera location or associated user.
- the attribute associated with the video may be security system data captured by a security system at the property 605 .
- the mobile phone 640 may receive security system data indicating that the event that triggered the first camera 610 to send video to the mobile phone 640 was associated with the daughter's room.
- the attribute may be a motion detection event sensed by a motion sensor positioned in the daughter's room or a combination of a first door sensor event detected by a door sensor at the front door and a second door sensor event detected by a door sensor at a door to the daughter's room.
- the mobile phone 640 may process the attributes of security system data and determine that the video is from the daughter's room or determine that the daughter would be interested in the video based on the other security system events detected at the property 605 .
- the mobile phone 640 After processing one or more attributes associated with the video and determining that the video is from the daughter's room or that the daughter would be interested in the video, the mobile phone 640 dynamically selects the list of virtual buttons 642 and 643 .
- the list of virtual buttons 642 and 643 includes a first button 642 that initiates sharing of the live video received from the first camera 610 with a dad user and a second button 643 that initiates sharing of the live video received from the first camera 610 with a daughter user.
- the mobile phone 640 suggests the dad user for sharing the video because the dad user is another primary contact for the property 605 and the mom user may be interested in sharing the video with the dad user to inform him of the situation and receive his opinion on the video.
- the mobile phone 640 also suggests the daughter user for sharing the video because the mobile phone 640 has detected that the video may be of interest to the daughter user based on one or more attributes associated with the video.
- the mom user may use the virtual buttons 642 and 643 to establish a connection and share the live video with any one or more the dad user and the daughter user.
- an event in the property 605 causes the second camera 620 to establish a connection with a mobile phone 640 of a mom user and begin sending video of the son's room to the mobile phone 640 of the mom user.
- the mobile phone 640 dynamically selects the list of virtual buttons 642 and 644 based on an attribute associated with the video.
- the attribute associated with the video may be identification information for the second camera 620 from which the video is being received.
- the mobile phone 640 may interpret the identification information for the second camera 620 and determine that the video is from the son's room based on a stored mapping of camera identification information to information describing camera location or associated user.
- the attribute associated with the video may be security system data captured by a security system at the property 605 .
- the mobile phone 640 may receive security system data indicating that the event that triggered the second camera 620 to send video to the mobile phone 640 was associated with the son's room.
- the attribute may be a motion detection event sensed by a motion sensor positioned in the son's room or a combination of a first door sensor event detected by a door sensor at the front door and a second door sensor event detected by a door sensor at a door to the son's room.
- the mobile phone 640 may process the attributes of security system data and determine that the video is from the son's room or determine that the son would be interested in the video based on the other security system events detected at the property 605 .
- the mobile phone 640 After processing one or more attributes associated with the video and determining that the video is from the son's room or that the son would be interested in the video, the mobile phone 640 dynamically selects the list of virtual buttons 642 and 644 .
- the list of virtual buttons 642 and 644 includes a first button 642 that initiates sharing of the live video received from the second camera 620 with a dad user and a second button 644 that initiates sharing of the live video received from the second camera 620 with a son user.
- the mobile phone 640 suggests the dad user for sharing the video because the dad user is another primary contact for the property 605 and the mom user may be interested in sharing the video with the dad user to inform him of the situation and receive his opinion on the video.
- the mobile phone 640 also suggests the son user for sharing the video because the mobile phone 640 has detected that the video may be of interest to the son user based on one or more attributes associated with the video.
- the mom user may use the virtual buttons 642 and 644 to establish a connection and share the live video with any one or more the dad user and the son user.
- an event in the property 605 causes the third camera 630 to establish a connection with a mobile phone 650 of a dad user and begin sending video of the dad's study to the mobile phone 650 of the dad user.
- the mobile phone 650 of the dad user includes a video display area 651 that displays the live video captured by the third camera 630 on the mobile phone 650 .
- the mobile phone 650 also displays a list of virtual buttons 652 that the dad user can activate to initiate sharing of the live video to one or more other devices.
- the mobile phone 650 further displays a start button 655 and a stop button 656 that the dad user can activate to control recording of the live video on electronic storage of the mobile phone 650 .
- the video is initially sent to the mobile phone 650 of the dad user as opposed to the mobile phone 640 of the mom user.
- the selection of the initial contact for the video data may be made based on an attribute associated with the video.
- the mobile phone 650 of the dad user may have been selected because the video is from the third camera 630 that captures video of the dad's study or because the security system at the property 605 detected events related to the dad's study (e.g., a motion sensor in the dad's study detecting motion or a door sensor for a door to the dad's study detecting a door opening event).
- the mobile phone 640 of the mom user was selected because the mom user was registered as the default primary contact for video data or because the mom user was registered as the primary contact for video related to the daughter's room and the son's room.
- the mobile phone 650 dynamically selects the list of virtual buttons 652 based on an attribute associated with the video.
- the attribute associated with the video may be identification information for the third camera 630 from which the video is being received.
- the mobile phone 650 may interpret the identification information for the third camera 630 and determine that the video is from the dad's study based on a stored mapping of camera identification information to information describing camera location or associated user.
- the attribute associated with the video may be security system data captured by a security system at the property 605 .
- the mobile phone 650 may receive security system data indicating that the event that triggered the third camera 630 to send video to the mobile phone 650 was associated with the dad's study.
- the attribute may be a motion detection event sensed by a motion sensor positioned in the dad's study or a combination of a first door sensor event detected by a door sensor at the front door and a second door sensor event detected by a door sensor at a door to the dad's study.
- the mobile phone 650 may process the attributes of security system data and determine that the video is from the dad's study based on the other security system events detected at the property 605 .
- the mobile phone 650 After processing one or more attributes associated with the video and determining that the video is from the dad's study, the mobile phone 650 dynamically selects the list of virtual buttons 652 . As shown, the list includes only a first button 652 that initiates sharing of the live video received from the third camera 630 with the mom user.
- the mobile phone 650 suggests the mom user for sharing the video because the mom user is another primary contact for the property 605 and the dad user may be interested in sharing the video with the mom user to inform her of the situation and receive her opinion on the video.
- the mobile phone 650 does not suggest the daughter user or the son user because the daughter user or the son user are likely not interested in or are not permitted to view video of the dad's study.
- the dad user may use the buttons 652 to establish a connection and share the live video with the mom user.
- FIG. 7 illustrates an example process 700 for automatically sharing image data.
- the system 200 detects that received image data has not been acknowledged within a first period of time from receipt ( 710 ). For instance, the system 200 determines that, although the image data has been received by a device, a user of the device has not acknowledged the image data in anyway. Accordingly, the image data may not have been displayed on the device and the device has received no confirmation that the image data has been perceived.
- the system 200 provides an alert indicating that the received image data will be automatically shared in a second period of time ( 720 ).
- the system 200 may provide an alert at the first device that receives the image data, may provide the alert through a security system located at the monitored property, and may provide the alert to another communication mechanism used by the user of the first device.
- the alert may attempt to alert the user to the image data and may indicate that the image data will be automatically shared in a period of time.
- the system 200 monitors for a response to the provided alert ( 730 ). For example, the system 200 monitors whether the image data is acknowledged at the first device. In addition, the system 200 monitors for a response communication to the alert (e.g., a response electronic mail message indicating that the image data should not be shared).
- a response communication to the alert e.g., a response electronic mail message indicating that the image data should not be shared.
- the system 200 automatically shares the received image data when no response to the provided alert has been received within the second period of time ( 740 ). For instance, the system 200 determines that, after the second period of time expires, the image data has not been acknowledged and that a proper response communication has not been received to stop automatic sharing of the image data. In response to that determination, the system 200 automatically identifies contact information for a device with which to share the received image data and automatically establishes a connection with the device using the identified contact information. The system 200 then automatically shares the received image data over the established connection to provide the received image data to another user that may be able to assess the received image data while the user of the first device is unavailable.
- FIGS. 8A-8C illustrate an example of automatically sharing image data.
- a property 805 includes a camera 815 that captures images of the property 805 .
- the camera 815 establishes a direct connection with a mobile phone 820 of a mom user associated with the property 805 and begins sending video of the property 805 over the established connection.
- the mobile phone 820 of the mom user is in a locked state and the mom user does not view the video on her mobile phone 820 . Accordingly, the mobile phone 820 of the mom user detects that live video has been received, but that the live video has not been acknowledged within a threshold period of time.
- the mobile phone 820 of the mom user in response to detecting that live video has been received and has not been acknowledged within a threshold period of time, provides an alert indicating that the live video will be automatically shared with a mobile phone 830 of a dad user in one minute.
- the mobile phone 820 may provide the alert at the mobile device 820 by displaying the alert on a display screen of the mobile phone 820 , activating a vibration device that causes the mobile phone 820 to vibrate, and/or outputting an audible alert using a speaker of the mobile phone 820 .
- the mobile phone 820 also may send the alert as an electronic communication to other communication devices used by the mom user.
- the mobile phone 820 may send the alert in an electronic mail message to an electronic mail address of the mom user, may send the alert in an instant message to an instant message account of the mom user, may send the alert in an SMS message to another mobile device used by the mom user, and/or may place an automated telephone call to another telephone number used by the mom user.
- the mobile phone 820 further sends the alert to other users associated with the property 805 and that are authorized to perceive the live video in the event that the mom user is unavailable.
- the mobile phone 820 may send the alert to a security system associated with the property 805 , so that the alert is output through the property 805 and a legitimate user in the property 805 can provide proper input to prevent the automatic sharing of the live video.
- the mobile phone 820 determines to automatically share the live video after the threshold period of time specified in the alert (i.e., one minute in this example) has passed.
- the mobile phone 820 determines to automatically share the live video because the live video remains unacknowledged and another control command was not received within the threshold period of time specified in the alert.
- the mobile phone 820 identifies the mobile phone 830 of the dad user as being the appropriate device with which to share the live video.
- the dad user may be registered as a secondary contact when the mom user is unavailable to handle alarm verification and the mobile phone 820 accesses contact information for the mobile phone 830 of the dad user.
- the mobile phone 820 of the mom user automatically, without user input, establishes a connection with the mobile phone 830 of the dad user and begins sharing the live video over the established connection.
- the mobile phone 830 of the dad user receives the shared video and begins displaying the shared video such that the dad user can view video of the property 805 and perform alarm verification or otherwise handle an alarm event at the property 805 .
- the mobile phone 830 of the dad user only receives video shared by the mobile phone 820 of the mom user, the dad user is unable to directly access the camera 815 and, as such, is unable to view video of the property 805 in situations where it is not shared by the mobile phone 820 of the mom user.
- the video may be automatically shared with multiple users.
- the mobile phone 820 may dynamically select one or more users for automatic sharing of video based on the circumstances. The dynamic selection may consider security system data at the property 805 and/or identification information for the camera 815 and the selection of one or more users with which to automatically share the video may leverage techniques described above with respect to FIGS. 5 and 6 .
- a user may control access to video and/or image data captured by a camera in the user's monitoring system (e.g., home alarm system).
- the user may temporarily allow a third party, such as a monitoring station or the police, to view the video and/or image data for purposes of alarm verification.
- the monitoring system detects an alarm event
- the user may be provided with an alert on the user's device and be able to view the video and/or image data from a remote location using the user's device.
- the user can share the video and/or image data with a device operated by a monitoring station and/or the police to verify that an alarm situation actually exists.
- monitoring stations often undergo a series of checks and delay periods prior to dispatching emergency services in response to a detected alarm event
- providing the monitoring station with access to the video and/or image data may allow faster and more accurate alarm verification and, thus, faster response from emergency services.
- the user controls access to the video and/or image data and the access by the monitoring station is temporary, the user's privacy may remain protected.
- video captured by a user's mobile device may be used for alarm verification purposes.
- a mobile device may be equipped with a camera and may be configured to capture live video using the camera.
- the mobile device also may include a native surveillance application that allows live video being captured by the mobile device to be shared with other users (e.g., a central monitoring station operator, a first responder, a family member, etc.) using techniques described throughout this disclosure.
- the shared live video may be used for alarm verification purposes in a similar manner as video or image data captured by a security system camera.
- the live video may be shared with one or more other users to verify the alarm situation.
- the live video captured by the mobile device may be combined with video or image data captured by a security system camera to provide additional views of the user's home and enhance alarm verification.
- location data e.g., a GPS location
- location data e.g., a GPS location
- another user e.g., a central monitoring station operator, a first responder, a family member, etc.
- verify the location at which the live video is being captured e.g., verify that the user is actually capturing live video of his or her home.
- the user may use a mobile device to capture live video of an alarm situation occurring outside of a property monitored by the user's security system (e.g., outside of the user's home).
- the user may activate the native surveillance application and begin sharing live video of the alarm situation with another user (e.g., a central monitoring station operator, a first responder, a family member, etc.).
- the native surveillance application also may share location data (e.g., a GPS location) of the mobile device to enable the other user to determine the location where the alarm situation is occurring.
- location data e.g., a GPS location
- the user may be involved a car accident and may activate the native surveillance application and begin sharing live video of the scene of the car accident with a central monitoring station operator.
- the central monitoring station operator may perceive the live video and quickly dispatch proper emergency services to the location of the car accident identified by location data shared by the mobile device.
- the user may be at a convenience store where a robbery is in progress.
- the user may discretely activate the native surveillance application and begin sharing live video of the robbery with a central monitoring station operator.
- the central monitoring station operator may perceive the live video and quickly dispatch proper emergency services to the location of the robbery identified by location data shared by the mobile device.
- the mobile device equipped with the native surveillance application may extend a user's security system outside of the user's home.
- the mobile device equipped with the native surveillance application may provide a portable extension of the user's security system that enables central monitoring station assistance to be provided to the user even for alarm situations occurring outside of the user's home.
- the described systems, methods, and techniques may be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of these elements. Apparatus implementing these techniques may include appropriate input and output devices, a computer processor, and a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor. A process implementing these techniques may be performed by a programmable processor executing a program of instructions to perform desired functions by operating on input data and generating appropriate output.
- the techniques may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
- Each computer program may be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language.
- Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory.
- Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (application-specific integrated circuits).
- EPROM Erasable Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- CD-ROM Compact Disc Read-Only Memory
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (20)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/970,266 US8810657B1 (en) | 2009-10-02 | 2013-08-19 | Video monitoring and alarm verification technology |
US14/461,749 US8937661B1 (en) | 2009-10-02 | 2014-08-18 | Video monitoring and alarm verification technology |
US14/598,522 US9478112B1 (en) | 2009-10-02 | 2015-01-16 | Video monitoring and alarm verification technology |
US15/332,613 US10388134B1 (en) | 2009-10-02 | 2016-10-24 | Video monitoring and alarm verification technology |
US16/502,620 US10902707B1 (en) | 2009-10-02 | 2019-07-03 | Video monitoring and alarm verification technology |
US17/130,412 US11741805B2 (en) | 2009-10-02 | 2020-12-22 | Video monitoring and alarm verification technology |
US18/220,655 US12125355B2 (en) | 2023-07-11 | Video monitoring and alarm verification technology |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24824709P | 2009-10-02 | 2009-10-02 | |
US12/897,359 US8675071B1 (en) | 2009-10-02 | 2010-10-04 | Video monitoring and alarm verification technology |
US13/011,087 US8520072B1 (en) | 2009-10-02 | 2011-01-21 | Video monitoring and alarm verification technology |
US13/970,266 US8810657B1 (en) | 2009-10-02 | 2013-08-19 | Video monitoring and alarm verification technology |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/011,087 Continuation US8520072B1 (en) | 2009-10-02 | 2011-01-21 | Video monitoring and alarm verification technology |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/461,749 Continuation US8937661B1 (en) | 2009-10-02 | 2014-08-18 | Video monitoring and alarm verification technology |
Publications (1)
Publication Number | Publication Date |
---|---|
US8810657B1 true US8810657B1 (en) | 2014-08-19 |
Family
ID=48999772
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/011,087 Active 2031-12-04 US8520072B1 (en) | 2009-10-02 | 2011-01-21 | Video monitoring and alarm verification technology |
US13/970,266 Active US8810657B1 (en) | 2009-10-02 | 2013-08-19 | Video monitoring and alarm verification technology |
US14/461,749 Active US8937661B1 (en) | 2009-10-02 | 2014-08-18 | Video monitoring and alarm verification technology |
US14/598,522 Active US9478112B1 (en) | 2009-10-02 | 2015-01-16 | Video monitoring and alarm verification technology |
US15/332,613 Active 2031-08-19 US10388134B1 (en) | 2009-10-02 | 2016-10-24 | Video monitoring and alarm verification technology |
US16/502,620 Active US10902707B1 (en) | 2009-10-02 | 2019-07-03 | Video monitoring and alarm verification technology |
US17/130,412 Active 2031-05-12 US11741805B2 (en) | 2009-10-02 | 2020-12-22 | Video monitoring and alarm verification technology |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/011,087 Active 2031-12-04 US8520072B1 (en) | 2009-10-02 | 2011-01-21 | Video monitoring and alarm verification technology |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/461,749 Active US8937661B1 (en) | 2009-10-02 | 2014-08-18 | Video monitoring and alarm verification technology |
US14/598,522 Active US9478112B1 (en) | 2009-10-02 | 2015-01-16 | Video monitoring and alarm verification technology |
US15/332,613 Active 2031-08-19 US10388134B1 (en) | 2009-10-02 | 2016-10-24 | Video monitoring and alarm verification technology |
US16/502,620 Active US10902707B1 (en) | 2009-10-02 | 2019-07-03 | Video monitoring and alarm verification technology |
US17/130,412 Active 2031-05-12 US11741805B2 (en) | 2009-10-02 | 2020-12-22 | Video monitoring and alarm verification technology |
Country Status (1)
Country | Link |
---|---|
US (7) | US8520072B1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140379721A1 (en) * | 2013-03-15 | 2014-12-25 | Athoc, Inc. | Personnel Crisis Communication Management System |
US20150341704A1 (en) * | 2014-05-20 | 2015-11-26 | Fxgear Inc. | Method of transmitting video to receiver including head-mounted display through network and transmitter, relay server and receiver for the same |
CN105828201A (en) * | 2016-04-22 | 2016-08-03 | 北京小米移动软件有限公司 | Video processing method and device |
US20160323548A1 (en) * | 2015-04-29 | 2016-11-03 | Honeywell International Inc. | System and method of sharing or connecting security and home control system |
US9805430B2 (en) | 2014-03-24 | 2017-10-31 | Athoc, Inc. | Crisis-related information exchange hub |
US10269224B2 (en) * | 2014-09-25 | 2019-04-23 | Sensormatic Electronics, LLC | Residential security using game platform |
US10482759B2 (en) | 2015-05-13 | 2019-11-19 | Tyco Safety Products Canada Ltd. | Identified presence detection in and around premises |
US20210110686A1 (en) * | 2009-10-02 | 2021-04-15 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
US11253181B2 (en) * | 2018-08-03 | 2022-02-22 | From Zero, LLC | Method for objectively tracking and analyzing the social and emotional activity of a patient |
US20230188594A1 (en) * | 2019-07-19 | 2023-06-15 | Snap Inc. | On-demand camera sharing over a network |
US11879273B2 (en) | 2016-02-16 | 2024-01-23 | Go Lock Technology, Inc. | Portable lock with integrity sensors |
US12125355B2 (en) | 2023-07-11 | 2024-10-22 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
Families Citing this family (169)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6658091B1 (en) | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US9131040B2 (en) | 2002-06-20 | 2015-09-08 | Numerex Corp. | Alarm system for use over satellite broadband |
US8509391B2 (en) | 2002-06-20 | 2013-08-13 | Numerex Corp. | Wireless VoIP network for security system monitoring |
US9054893B2 (en) | 2002-06-20 | 2015-06-09 | Numerex Corp. | Alarm system IP network with PSTN output |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US8963713B2 (en) | 2005-03-16 | 2015-02-24 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US9609003B1 (en) | 2007-06-12 | 2017-03-28 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US8988221B2 (en) | 2005-03-16 | 2015-03-24 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US8635350B2 (en) | 2006-06-12 | 2014-01-21 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US12063220B2 (en) | 2004-03-16 | 2024-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US9141276B2 (en) | 2005-03-16 | 2015-09-22 | Icontrol Networks, Inc. | Integrated interface for mobile device |
US20170118037A1 (en) | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US7711796B2 (en) | 2006-06-12 | 2010-05-04 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
GB2428821B (en) | 2004-03-16 | 2008-06-04 | Icontrol Networks Inc | Premises management system |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US9191228B2 (en) | 2005-03-16 | 2015-11-17 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US20170180198A1 (en) | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US7956735B2 (en) | 2006-05-15 | 2011-06-07 | Cernium Corporation | Automated, remotely-verified alarm system with intrusion and video surveillance and digital video recording |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US12063221B2 (en) | 2006-06-12 | 2024-08-13 | Icontrol Networks, Inc. | Activation of gateway device |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US12003387B2 (en) | 2012-06-27 | 2024-06-04 | Comcast Cable Communications, Llc | Control system user interface |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
EP2174310A4 (en) | 2007-07-16 | 2013-08-21 | Cernium Corp | Apparatus and methods for video alarm verification |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US9055439B2 (en) * | 2009-03-03 | 2015-06-09 | Mobilities, LLC | System and method for handset operation in a wireless communication network |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
CN102985915B (en) | 2010-05-10 | 2016-05-11 | 网际网路控制架构网络有限公司 | Control system user interface |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
WO2012138443A1 (en) | 2011-04-04 | 2012-10-11 | Numerek Corp. | Delivery of alarm system event data and audio over hybrid networks |
EP2695370A4 (en) | 2011-04-04 | 2015-03-11 | Numerex Corp | Delivery of alarm system event data and audio |
US8705716B2 (en) | 2011-04-27 | 2014-04-22 | Numerex Corp. | Interactive control of alarm systems by telephone interface using an intermediate gateway |
US8881170B2 (en) * | 2012-04-30 | 2014-11-04 | Genesys Telecommunications Laboratories, Inc | Method for simulating screen sharing for multiple applications running concurrently on a mobile platform |
CN104520860A (en) * | 2012-08-06 | 2015-04-15 | 皇家飞利浦有限公司 | Method and apparatus for the real time annotation of a medical treatment event |
US9177464B2 (en) | 2012-09-28 | 2015-11-03 | Numerex Corp. | Method and system for untethered two-way voice communication for an alarm system |
KR102058918B1 (en) * | 2012-12-14 | 2019-12-26 | 삼성전자주식회사 | Home monitoring method and apparatus |
US9589453B2 (en) * | 2013-03-14 | 2017-03-07 | Vivint, Inc. | Dynamic linking of security systems |
US10999561B2 (en) * | 2013-03-15 | 2021-05-04 | Vivint, Inc. | Methods for using an image capture device integrated at a building entry with an automation control panel, and systems and devices related thereto |
EP4006860A1 (en) | 2013-04-23 | 2022-06-01 | Canary Connect, Inc. | Security and/or monitoring devices and systems |
US9485472B2 (en) * | 2013-05-13 | 2016-11-01 | Honeywell International Inc. | System and method for enhanced privacy, resource and alert management |
WO2014200621A1 (en) * | 2013-06-13 | 2014-12-18 | Evernote Corporation | Initializing chat sessions by pointing to content |
US9207659B1 (en) | 2013-08-05 | 2015-12-08 | Ameer Sami | System and method for automating electrical devices at a building structure |
US9686223B2 (en) * | 2013-10-02 | 2017-06-20 | Honeywell International Inc. | System and method of creating a network based dynamic response list |
US20150145991A1 (en) * | 2013-11-22 | 2015-05-28 | Vose Technical Systems, Inc. | System and method for shared surveillance |
CN103914940A (en) * | 2014-02-25 | 2014-07-09 | 健雄职业技术学院 | Indoor antitheft monitoring system based on wireless sensor network technology and monitoring method thereof |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11146637B2 (en) * | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US10467701B1 (en) | 2014-03-10 | 2019-11-05 | Allstate Insurance Company | Home event detection and processing |
US10070035B2 (en) * | 2014-04-02 | 2018-09-04 | Alarm.Com Incorporated | Monitoring system configuration technology |
US9838858B2 (en) | 2014-07-08 | 2017-12-05 | Rapidsos, Inc. | System and method for call management |
US9183730B1 (en) | 2014-07-16 | 2015-11-10 | Numerex Corp. | Method and system for mitigating invasion risk associated with stranger interactions in a security system environment |
EP3195563B1 (en) | 2014-09-19 | 2021-12-15 | Rapidsos Inc. | Method for emergency call management |
US9449497B2 (en) | 2014-10-24 | 2016-09-20 | Numerex Corp. | Method and system for detecting alarm system tampering |
US9576466B2 (en) | 2014-11-04 | 2017-02-21 | Canary Connect, Inc. | Backup contact for security/safety monitoring system |
US10412342B2 (en) * | 2014-12-18 | 2019-09-10 | Vivint, Inc. | Digital zoom conferencing |
US10417883B2 (en) | 2014-12-18 | 2019-09-17 | Vivint, Inc. | Doorbell camera package detection |
US9805587B2 (en) | 2015-05-19 | 2017-10-31 | Ecolink Intelligent Technology, Inc. | DIY monitoring apparatus and method |
US9998713B2 (en) * | 2015-07-22 | 2018-06-12 | Che Wei Lin | Device and system for security monitoring |
WO2017036480A1 (en) * | 2015-08-31 | 2017-03-09 | Cb Svendsen A/S | Method for monitoring one or more pet traps, such as rat traps |
KR102377182B1 (en) | 2015-09-01 | 2022-03-22 | 엘지전자 주식회사 | Mobile terminal and control method for the mobile terminal |
US10299017B2 (en) | 2015-09-14 | 2019-05-21 | Logitech Europe S.A. | Video searching for filtered and tagged motion |
US9805567B2 (en) | 2015-09-14 | 2017-10-31 | Logitech Europe S.A. | Temporal video streaming and summaries |
US9313556B1 (en) | 2015-09-14 | 2016-04-12 | Logitech Europe S.A. | User interface for video summaries |
MX2018005568A (en) | 2015-11-02 | 2018-11-09 | Rapidsos Inc | Method and system for situational awareness for emergency response. |
WO2017106775A1 (en) | 2015-12-17 | 2017-06-22 | Rapidsos, Inc. | Devices and methods for efficient emergency calling |
US10497233B2 (en) | 2015-12-28 | 2019-12-03 | Google Llc | Sharing video stream during an alarm event |
US10841542B2 (en) | 2016-02-26 | 2020-11-17 | A9.Com, Inc. | Locating a person of interest using shared video footage from audio/video recording and communication devices |
US10448086B2 (en) * | 2016-02-26 | 2019-10-15 | Amazon Technologies, Inc. | Sharing video footage from audio/video recording and communication devices to smart TV devices |
US11393108B1 (en) | 2016-02-26 | 2022-07-19 | Amazon Technologies, Inc. | Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices |
US9986404B2 (en) | 2016-02-26 | 2018-05-29 | Rapidsos, Inc. | Systems and methods for emergency communications amongst groups of devices based on shared data |
US10748414B2 (en) | 2016-02-26 | 2020-08-18 | A9.Com, Inc. | Augmenting and sharing data from audio/video recording and communication devices |
JP6503148B1 (en) | 2016-02-26 | 2019-04-17 | アマゾン テクノロジーズ インコーポレイテッド | Cross-referencing of applications related to sharing of video images from audio / video recording and communication devices |
US10397528B2 (en) | 2016-02-26 | 2019-08-27 | Amazon Technologies, Inc. | Providing status information for secondary devices with video footage from audio/video recording and communication devices |
US10489453B2 (en) | 2016-02-26 | 2019-11-26 | Amazon Technologies, Inc. | Searching shared video footage from audio/video recording and communication devices |
US9965934B2 (en) | 2016-02-26 | 2018-05-08 | Ring Inc. | Sharing video footage from audio/video recording and communication devices for parcel theft deterrence |
US10674116B2 (en) * | 2016-03-08 | 2020-06-02 | Eagle Eye Networks, Inc | System and apparatus for sharing private video streams with first responders |
US10505923B2 (en) * | 2016-03-08 | 2019-12-10 | Dean Drako | Apparatus for sharing private video streams with first responders and method of operation |
US11381605B2 (en) * | 2016-03-08 | 2022-07-05 | Eagle Eye Networks, Inc. | System, methods, and apparatus for sharing private video stream assets with first responders |
US10630835B2 (en) | 2016-03-08 | 2020-04-21 | T-Mobile Usa, Inc. | Content sharing between related devices |
US10939141B2 (en) * | 2016-03-08 | 2021-03-02 | Eagle Eye Networks, Inc. | Apparatus for sharing private video streams with first responders and mobile method of operation |
US10848808B2 (en) * | 2016-03-08 | 2020-11-24 | Eagle Eye Networks, Inc. | Apparatus for sharing private video streams with public service agencies |
US10356745B2 (en) | 2016-06-08 | 2019-07-16 | T-Mobile Usa, Inc. | Device and/or line event awareness and smart synchronization |
CN106303443A (en) * | 2016-08-29 | 2017-01-04 | 芜湖凯尔电气科技有限公司 | Home cinema instrument |
US10956545B1 (en) * | 2016-11-17 | 2021-03-23 | Alarm.Com Incorporated | Pin verification |
RU2748703C2 (en) * | 2016-12-15 | 2021-05-28 | Фабио Д'АНДЖЕЛО | Surveillance device |
RU2646743C1 (en) * | 2017-01-24 | 2018-03-06 | Общество с ограниченной ответственностью Конструкторское Бюро "ПИРОЦЕЛЬС" | Safety system |
USD857776S1 (en) | 2017-04-05 | 2019-08-27 | Ademco Inc. | Internet protocol camera |
US10362340B2 (en) | 2017-04-06 | 2019-07-23 | Burst, Inc. | Techniques for creation of auto-montages for media content |
US10701310B2 (en) | 2017-06-23 | 2020-06-30 | T-Mobile Usa, Inc. | Video call continuity between devices via a telecommunications network |
US10522002B2 (en) * | 2017-06-30 | 2019-12-31 | Michael Wilkinson | Systems and methods for automatically tracking tokens dropped into a drop box |
US20190007656A1 (en) * | 2017-06-30 | 2019-01-03 | AVAST Software s.r.o. | Sending network camera video streams to active screens |
EP3721402A4 (en) | 2017-12-05 | 2021-08-04 | Rapidsos Inc. | Social media content for emergency management |
WO2019204228A1 (en) | 2018-04-16 | 2019-10-24 | Rapidsos, Inc. | Emergency data management and access system |
CN108712736B (en) * | 2018-04-28 | 2021-09-21 | 北京小米移动软件有限公司 | Method, device and system for searching equipment |
EP3803774A4 (en) | 2018-06-11 | 2022-03-09 | Rapidsos, Inc. | Systems and user interfaces for emergency data integration |
US11176383B2 (en) * | 2018-06-15 | 2021-11-16 | American International Group, Inc. | Hazard detection through computer vision |
US11917514B2 (en) | 2018-08-14 | 2024-02-27 | Rapidsos, Inc. | Systems and methods for intelligently managing multimedia for emergency response |
US10977927B2 (en) | 2018-10-24 | 2021-04-13 | Rapidsos, Inc. | Emergency communication flow management and notification system |
US11218584B2 (en) | 2019-02-22 | 2022-01-04 | Rapidsos, Inc. | Systems and methods for automated emergency response |
US11346938B2 (en) | 2019-03-15 | 2022-05-31 | Msa Technology, Llc | Safety device for providing output to an individual associated with a hazardous environment |
EP3949467A4 (en) | 2019-03-29 | 2023-01-25 | Rapidsos Inc. | Systems and methods for emergency data integration |
US11496617B2 (en) * | 2019-07-22 | 2022-11-08 | Jeremy Davis | Car surveillance system |
WO2021034859A1 (en) | 2019-08-19 | 2021-02-25 | Rapidsos, Inc. | Systems and methods for delivering and supporting digital requests for emergency service |
US10972655B1 (en) | 2020-03-30 | 2021-04-06 | Logitech Europe S.A. | Advanced video conferencing systems and methods |
US10904446B1 (en) | 2020-03-30 | 2021-01-26 | Logitech Europe S.A. | Advanced video conferencing systems and methods |
US10965908B1 (en) | 2020-03-30 | 2021-03-30 | Logitech Europe S.A. | Advanced video conferencing systems and methods |
US10951858B1 (en) | 2020-03-30 | 2021-03-16 | Logitech Europe S.A. | Advanced video conferencing systems and methods |
US11330664B1 (en) | 2020-12-31 | 2022-05-10 | Rapidsos, Inc. | Apparatus and method for obtaining emergency data and providing a map view |
US11979396B2 (en) | 2021-05-19 | 2024-05-07 | Bank Of America Corporation | Information security system and method for machine-to-machine (M2M) security and validation |
WO2022256772A1 (en) * | 2021-06-03 | 2022-12-08 | Alarm.Com Incorporated | Recording video quality |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6965313B1 (en) * | 2001-04-24 | 2005-11-15 | Alarm.Com Inc. | System and method for connecting security systems to a wireless device |
US6970183B1 (en) * | 2000-06-14 | 2005-11-29 | E-Watch, Inc. | Multimedia surveillance and monitoring system including network configuration |
US20070009104A1 (en) * | 2004-09-23 | 2007-01-11 | Renkis Martin A | Wireless smart camera system and method |
US8520072B1 (en) * | 2009-10-02 | 2013-08-27 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020104094A1 (en) * | 2000-12-01 | 2002-08-01 | Bruce Alexander | System and method for processing video data utilizing motion detection and subdivided video fields |
US20030012344A1 (en) * | 2001-07-10 | 2003-01-16 | Rita Agarwal | System and a method for emergency services |
-
2011
- 2011-01-21 US US13/011,087 patent/US8520072B1/en active Active
-
2013
- 2013-08-19 US US13/970,266 patent/US8810657B1/en active Active
-
2014
- 2014-08-18 US US14/461,749 patent/US8937661B1/en active Active
-
2015
- 2015-01-16 US US14/598,522 patent/US9478112B1/en active Active
-
2016
- 2016-10-24 US US15/332,613 patent/US10388134B1/en active Active
-
2019
- 2019-07-03 US US16/502,620 patent/US10902707B1/en active Active
-
2020
- 2020-12-22 US US17/130,412 patent/US11741805B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6970183B1 (en) * | 2000-06-14 | 2005-11-29 | E-Watch, Inc. | Multimedia surveillance and monitoring system including network configuration |
US6965313B1 (en) * | 2001-04-24 | 2005-11-15 | Alarm.Com Inc. | System and method for connecting security systems to a wireless device |
US20070009104A1 (en) * | 2004-09-23 | 2007-01-11 | Renkis Martin A | Wireless smart camera system and method |
US8520072B1 (en) * | 2009-10-02 | 2013-08-27 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
Non-Patent Citations (2)
Title |
---|
U.S. Non-Final Office Action for U.S. Appl. No. 13/011,087 dated May 21, 2013, 20 pages. |
U.S. Notice of Allowance for U.S. Appl. No. 13/011,087 dated Jul. 19, 2013, 10 pages. |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210110686A1 (en) * | 2009-10-02 | 2021-04-15 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
US11741805B2 (en) * | 2009-10-02 | 2023-08-29 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
US9218432B2 (en) * | 2013-03-15 | 2015-12-22 | Athoc, Inc. | Personnel crisis communication management system |
US9986374B2 (en) | 2013-03-15 | 2018-05-29 | Athoc, Inc. | Personnel crisis communications management system |
US10917775B2 (en) | 2013-03-15 | 2021-02-09 | Athoc, Inc. | Personnel status tracking system in crisis management situations |
US20140379721A1 (en) * | 2013-03-15 | 2014-12-25 | Athoc, Inc. | Personnel Crisis Communication Management System |
US10846811B2 (en) | 2014-03-24 | 2020-11-24 | Athoc, Inc. | Crisis-related inter-organization information exchange hub |
US9805430B2 (en) | 2014-03-24 | 2017-10-31 | Athoc, Inc. | Crisis-related information exchange hub |
US20150341704A1 (en) * | 2014-05-20 | 2015-11-26 | Fxgear Inc. | Method of transmitting video to receiver including head-mounted display through network and transmitter, relay server and receiver for the same |
US10269224B2 (en) * | 2014-09-25 | 2019-04-23 | Sensormatic Electronics, LLC | Residential security using game platform |
US20160323548A1 (en) * | 2015-04-29 | 2016-11-03 | Honeywell International Inc. | System and method of sharing or connecting security and home control system |
CN106157567A (en) * | 2015-04-29 | 2016-11-23 | 霍尼韦尔国际公司 | System and method for sharing or connecting security and home control systems |
US10321101B2 (en) * | 2015-04-29 | 2019-06-11 | Ademco Inc. | System and method of sharing or connecting security and home control system |
US10482759B2 (en) | 2015-05-13 | 2019-11-19 | Tyco Safety Products Canada Ltd. | Identified presence detection in and around premises |
US10713934B2 (en) | 2015-05-13 | 2020-07-14 | Tyco Safety Products Canada Ltd. | Detecting of patterns of activity based on identified presence detection |
US10504358B2 (en) | 2015-05-13 | 2019-12-10 | Tyco Safety Products Canada Ltd. | Simplified user interaction with intrusion systems based on identified presence detection |
US10650668B2 (en) | 2015-05-13 | 2020-05-12 | Tyco Safety Products Canada Ltd. | Minimizing false alarms based on identified presence detection |
US11879273B2 (en) | 2016-02-16 | 2024-01-23 | Go Lock Technology, Inc. | Portable lock with integrity sensors |
CN105828201A (en) * | 2016-04-22 | 2016-08-03 | 北京小米移动软件有限公司 | Video processing method and device |
CN105828201B (en) * | 2016-04-22 | 2019-05-21 | 北京小米移动软件有限公司 | Method for processing video frequency and device |
US20170311004A1 (en) * | 2016-04-22 | 2017-10-26 | Beijing Xiaomi Mobile Software Co., Ltd. | Video processing method and device |
US20220167896A1 (en) * | 2018-08-03 | 2022-06-02 | From Zero, LLC | Method for Objectively Tracking and Analyzing the Social and Emotional Activity of a Patient |
US11744495B2 (en) * | 2018-08-03 | 2023-09-05 | From Zero, LLC | Method for objectively tracking and analyzing the social and emotional activity of a patient |
US11253181B2 (en) * | 2018-08-03 | 2022-02-22 | From Zero, LLC | Method for objectively tracking and analyzing the social and emotional activity of a patient |
US20230188594A1 (en) * | 2019-07-19 | 2023-06-15 | Snap Inc. | On-demand camera sharing over a network |
US12095846B2 (en) * | 2019-07-19 | 2024-09-17 | Snap Inc. | On-demand camera sharing over a network |
US12125355B2 (en) | 2023-07-11 | 2024-10-22 | Alarm.Com Incorporated | Video monitoring and alarm verification technology |
Also Published As
Publication number | Publication date |
---|---|
US11741805B2 (en) | 2023-08-29 |
US10388134B1 (en) | 2019-08-20 |
US20210110686A1 (en) | 2021-04-15 |
US8937661B1 (en) | 2015-01-20 |
US9478112B1 (en) | 2016-10-25 |
US20230351872A1 (en) | 2023-11-02 |
US10902707B1 (en) | 2021-01-26 |
US8520072B1 (en) | 2013-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11741805B2 (en) | Video monitoring and alarm verification technology | |
US8675071B1 (en) | Video monitoring and alarm verification technology | |
US10522029B1 (en) | Handling duress input | |
US11410535B1 (en) | Monitoring system control technology using multiple sensors, cameras, lighting devices, and a thermostat | |
US11657698B2 (en) | Providing internet access through a property monitoring system | |
US11854357B2 (en) | Object tracking using disparate monitoring systems | |
EP2772891B1 (en) | System and method for interacting with digital video recorders through social networking applications | |
US12125355B2 (en) | Video monitoring and alarm verification technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALARM.COM INCORPORATED, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SLAVIN, ALISON JANE;MCCARTHY, ROBERT J., JR.;HUTZ, DAVID JAMES;AND OTHERS;REEL/FRAME:031172/0169 Effective date: 20110114 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:ALARM.COM INCORPORATED;ENERGYHUB, INC.;REEL/FRAME:032860/0969 Effective date: 20140508 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: ENERGYHUB, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:033673/0347 Effective date: 20140829 Owner name: ALARM.COM INCORPORATED, VIRGINIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:033673/0347 Effective date: 20140829 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ALARM.COM INCORPORATED;ENERGYHUB, INC.;REEL/FRAME:033681/0164 Effective date: 20140829 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALIFORNIA Free format text: SUPPLEMENT TO PATENT SECURITY AGREEMENT;ASSIGNOR:ALARM.COM INCORPORATED;REEL/FRAME:039656/0134 Effective date: 20160810 Owner name: SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT, CALI Free format text: SUPPLEMENT TO PATENT SECURITY AGREEMENT;ASSIGNOR:ALARM.COM INCORPORATED;REEL/FRAME:039656/0134 Effective date: 20160810 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:ALARM.COM, INCORPORATED;ENERGYHUB, INC.;ICN ACQUISITION, LLC;REEL/FRAME:044167/0235 Effective date: 20171006 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
AS | Assignment |
Owner name: ENERGYHUB, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:055069/0001 Effective date: 20210120 Owner name: ICN ACQUISITION, LLC, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:055069/0001 Effective date: 20210120 Owner name: ALARM.COM INCORPORATED, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:055069/0001 Effective date: 20210120 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |